RESEARCH
Part 1: Threat Actors Don't Pick You. You Just Happen to Be There.

There's this idea that floats around—usually in boardrooms and in forums—that advanced threat actors operate like surgeons. They pick a target, they plan it out, they execute. Super deliberate. Undeniably cinematic. It implies that a breach is something that happens ...
Cyber Compliance
Stop Getting Mad When Your Client Won’t Buy Compliance

You know the look. You explain how they need MFA, a risk assessment, documented policies, backups that actually restore… and your client stares back at you like you just recited the GDPR in ancient Greek. You leave the meeting frustrated. ...
“Fined Without a Breach?” Why the Wojeski $60,000 Penalty Matters—even if You Think You’re Small

You’ve seen two kinds of headlines after cyber incidents: (1) lawsuits and (2) regulatory enforcement. The recent $60,000 fine against Wojeski ...
New California Audit Law Just Put Your MSP on the Hook. Here’s How to Turn It Into Recurring Revenue

If your clients process sensitive data, your MSP is now part of the legal conversation. On July 24, 2025, California finalized new rules that require businesses processing high-risk personal information to undergo annual, independent cybersecurity audits. This isn’t just for ...
Cyber Liability
One Misconfigured AI Agent Can Impact Every Client You Manage

When One Action Hits Every Client, Governance Decides the Outcome Imagine a hypothetical that’s taught in law school every semester: A delivery driver abandons his route to join a drum circle for three days. On his way back, he causes ...
They Already Have an IT Department. Good. That’s Why You Should Call.

Last night I was at dinner with the CEO of an MSP. Good operator. Growing. Adding clients. Doing the work. We were walking around his town before dinner talking about the usual founder stuff. Processes. How to get people to ...
Agentic AI at the Edge: Opportunity, Autonomy & the Coming Legal Minefield

You’ve probably heard executives gush about autonomous AI agents, the shiny new productivity booster that can automate workflows faster than you can say “zero-trust.” But what they don’t hype is how agentic AI turns your cybersecurity playbook into an existential ...
Insurance & MSP Liability
The Clients You're Ignoring Are the Ones Who Will Sue You

I said something on stage at XChange last week that made a lot of people in the room uncomfortable. "Your smallest clients are your biggest risk." Not your enterprise accounts. Not the ones with complex environments and demanding SLAs. The ...
You’re Not Insured. You’re Just Hopeful.

So there I am, wrapping up a conference session—over 1,000 MSPs in the building—and one guy comes up clutching a fresh copy of Standardized like it’s a fire extinguisher in a server room. He’s nodding along, clearly rattled in all ...
Your MSP Carries More Risk Than a Magazine Stand—and That’s a Problem

Let’s talk about airport gift shops for a minute. You know the ones—tiny kiosks with $14 neck pillows, expired jerky, and three copies of Men’s Health no one’s ever going to read. Now, tell me—how much sensitive data do you ...
More Articles
A Disguised Windows License Activator May Actually Be Malware
People who are in the habit of pirating movies and software have something new to worry about. It seems hackers have begun targeting at least some of them with a ubiquitous form ...
Google Play Store Is Seeing More Trojan Style Malware
A security researcher who goes by the name "Dr. Web" has been tracking a suspicious increase in Trojan infiltration emanating from the Google Play Store. It is not currently known whether a ...
Automotive Part Maker Denso Is Latest To Have Data Breached
The automotive parts giant named DENSO is the latest corporation to fall victim to a hacking attack. The company has offices all over the world and supplies parts to brands including General ...
Secure Your SQL Server To Avoid This Malware Infection
Do you rely on Microsoft SQL and MySQL databases? If so, be advised that the cybersecurity firm AhnLab recently published a report about a newly emerging threat. It seems that hackers are ...
Email Phishing Attackers Are Pretending To Be The IRS
Emotet is in the news again according to the latest information from email security firm Cofense. Emotet is notorious for spreading via phishing campaigns and this latest phishing campaign sees them impersonating ...
File Explorer May Get Tabs In Windows 11
Are you a Windows Insider? If so, be aware that the company is testing a "hidden" new feature you're probably going to love. It's a small change but its impact is enormous. ...
You May See Ads For Microsoft Products With Windows 11
Microsoft may have inadvertently signaled that they are soon going to reincorporate ads into Microsoft 11, which is going to please exactly no one. In the most recent Windows Insiders build, third ...
Clipchamp Will Soon Replace Movie Maker For Windows 11
If you're an early adopter playing with the Windows 11 builds as they come out and you are a "Windows Insider," then you probably already know this. In the latest build, users ...
This Malware Phishing Campaign Hijacks Email Conversations
Hackers have been using social engineering tricks to get their malicious code onto the systems of unsuspecting victims. This has been happening for almost as long as the internet has been around. ...
Some AMD Ryzen CPU Users Experiencing Windows 11 Issues
Do you have a PC with an AMD Ryzen CPU? If so, be aware that AMD has found an issue which causes "temporary pauses in system interactivity or responsiveness." The issue affects ...
New Archive Feature Helps Mobile Users Save Space
The problem with smartphones is that they eventually run out of room. Honestly it's a wonder the issue isn't even bigger than it is. After all, miniaturization isn't cheap but smartphone manufacturers ...
Hackers Get Source Code During Data Breach At Samsung
Samsung's corporate network was breached recently. That's bad news all by itself. The company has recently confirmed that in addition to the confidential customer information that was stolen, the hackers also made ...


